ORIGINAL RESEARCH
Improvement and applications of secure outsourcing of scientific
computations
Jianhua Yu
1
•
Xueli Wang
1
•
Wei Gao
2
Received: 1 December 2014 / Accepted: 1 April 2015 / Published online: 22 April 2015
Springer-Verlag Berlin Heidelberg 2015
Abstract Methods for solving equations play an impor-
tant role in scientific computa tion and cryptography. Usu-
ally, many cryptographic protocols and scientific
computation problems can be reduced to some differential
equation or linear equation systems. However, the above
mentioned scientific computation needs very much com-
putation resource. Hence, super computer technology such
as grid technology, cloud computation is slow to emerge.
Cloud computation has strong computation power and
helps users to deals with this very difficult computation.
For security, we need improve some conditional compu-
tation methods for numerical or scientific outsourcing
computation. In this paper some special algebraic and
differential equations are studied. And some new practical
verifiably secure outsourcing protocols are designed, which
are better than the previous methods in the following terms.
First, they can protect more secret parameters for abstract
equations. Second, based on previous methods, random
function can be chosen in the different ways and hence
better security and privacy is obtained. Third, for nonlinear
equations, we find more applications and new methods .
These tools help us to find more methods to deal with more
linear or nonlinear equations. At last, some verifiably
secure outsourcing computation for integral computation is
designed. These results help to outsource the computation
for solving differential equations.
Keywords Securely outsourcing Scientific
computations Cloud computing Equation Disguise
1 Introduction
1.1 Background and significance
In the fields of physical security and information security,
access control is the selective restriction of access to a
place or other resource. The act of accessing may mean
consuming, entering, or using. Permission to access a re-
source is called authorization. Scientific research is a part
of human cognitive and practical act ivities. As scientific
computing develops, so does scientific research which
takes on different features amid diverse historical eras.
Having been as indispensable a scientific research tech-
nique as scientific theories and scientific experiments, what
we call scientific computing refers to the process that one
uses computers for the purpose of solving problems that
arise in scientific research and engineering technology. The
array of fields in scientific research—high energy physics,
bioinformatics, earth evolution and atmospheric science all
owe a great deal to scientific computing. In contrast with
traditional scientific research, modern scient ific research
boasts large-scale cooperations and overlapping disci-
plines. By the way, all disciplines are none the more iso-
lated. Modern scientific research depends much of its
techniques and methods on burge oning information tech-
nology and network techniques. Scientific computations
nowadays, especially cloud computing, rely on tremendous
& Jianhua Yu
yujianhuascnu@126.com
Xueli Wang
wangxuyuyan@gmail.com
Wei Gao
mygaowei@163.com
1
School of Mathematical Sciences, South China Normal
University, Guangzhou, People’s Republic of China
2
School of Mathematics and Statistics, Lu Dong University,
YanTai, People’s Republic of China
123
J Ambient Intell Human Comput (2015) 6:763–772
DOI 10.1007/s12652-015-0280-0